2020
DOI: 10.1109/jiot.2019.2954919
|View full text |Cite
|
Sign up to set email alerts
|

Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…In these attackers, the attackers collude negative feedback and cause of deteriorate the smart grid system performance. 4 Data attack In these attackers, the attackers manipulate, alter or delete the data and mislead the smart grids for wrong decisions. 5…”
Section: Bad Mouthing Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…In these attackers, the attackers collude negative feedback and cause of deteriorate the smart grid system performance. 4 Data attack In these attackers, the attackers manipulate, alter or delete the data and mislead the smart grids for wrong decisions. 5…”
Section: Bad Mouthing Attackmentioning
confidence: 99%
“…Smart grids systems should be able to defend their information from unauthorized access, disruption, inspection, modification, and disclosure. All data and communication processes should be integrated, confidential, non-repudiation from attackers and outside world [4,33]. Although, various models and frameworks have been proposed to secure the smart grid communication process still these networks are suffered from security and privacy issues.…”
Section: Introductionmentioning
confidence: 99%
“…U, W, and V represent weight matrices. e output value O t is calculated in equation ( 1), and the state value S t is calculated in equation (2).…”
Section: Bidirectional Recurrent Neural Networkmentioning
confidence: 99%
“…However, mixing well-known URLs with malicious URLs to cause user confusion and achieve intrusion attacks on the host is one of the most common attack methods. At present, malicious URLs are detected by using rule matching and the black-and-white list [2,3]. But these methods are excessively dependent on the knowledge breadth of security personnel, which increases the possibility of false blocking of malicious URLs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation